Search

Your search keyword '"Key-recovery attack"' showing total 286 results

Search Constraints

Start Over You searched for: Descriptor "Key-recovery attack" Remove constraint Descriptor: "Key-recovery attack"
286 results on '"Key-recovery attack"'

Search Results

1. Quantum Attacks on MIBS Block Cipher Based on Bernstein–Vazirani Algorithm.

4. Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros.

5. Exploiting ROLLO's constant-time implementations with a single-trace analysis.

6. Cryptanalysis of Ivanov–Krouk–Zyablov Cryptosystem

7. On the matrix code of quadratic relationships for a Goppa code.

8. Improved Differential Attack on Round-Reduced LEA

9. Improved key-recovery attacks on reduced-round WEM-8.

10. Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AES

11. Lattice Attacks on NTRU Revisited

12. A Key-Recovery Attack on 855-round Trivium

13. MixColumns Properties and Attacks on (Round-Reduced) AES with a Single Secret S-Box

14. Applications of Simon's algorithm in quantum attacks on Feistel variants.

15. Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions

16. Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES

17. Security analysis of secure kNN and ranked keyword search over encrypted data.

18. A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors

19. On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks

20. A Key Recovery Reaction Attack on QC-MDPC.

21. Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis

22. Subspace Trail Cryptanalysis and its Applications to AES

23. Truncated Differential Analysis of Reduced-Round LBlock

24. A Simple Key-Recovery Attack on McOE-X

25. New Truncated Differential Cryptanalysis on 3D Block Cipher

26. The 7-Round Subspace Trail-Based Impossible Differential Distinguisher of Midori-64

27. A theoretical investigation on the distinguishers of Salsa and ChaCha

28. Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation

29. Cryptanalysis of a Code-Based Signature Scheme Based on the Schnorr-Lyubashevsky Framework

30. Cryptanalysis of Achterbahn-128/80

31. Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128

32. SMT‐based cube attack on round‐reduced Simeck32/64

33. White-Box Implementation of Shamir’s Identity-Based Signature Scheme

34. On the security of subspace subcodes of Reed-Solomon codes for public key encryption

35. Towards advance encryption based on a Generalized Suzuki 2-groups

36. Generalized Matsui Algorithm 1 with Application for the Full DES

37. On the security of the modified Dual-ouroboros PKE using Gabidulin codes

38. Proving the biases of Salsa and ChaCha in differential attack

39. An Efficient MQ-Signature Scheme Based on Sparse Polynomials

40. Key-recovery attacks on LED-like block ciphers

41. Advanced conditional differential attack on Grain‐like stream cipher and application on Grain v1

42. A Key Recovery Reaction Attack on QC-MDPC

43. Unbalanced biclique cryptanalysis of a full round Midori

44. Quantum key recovery attack on SIMON32/64

45. Improved encryption scheme based on the automorphism group of the Ree function field

46. Cryptanalysis of a homomorphic encryption scheme from ISIT 2008.

47. Hybrid Encryption Algorithm for the Data Security of ESP32 based IoT-enabled Robots

48. DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel

49. Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V

50. Performance Comparison Between Deep Learning-Based and Conventional Cryptographic Distinguishers

Catalog

Books, media, physical & digital resources